How To Respond Cyber Incident In your Organization
An incident response plan is very essential for any organization to respond to the incident as quickly as possible. Here we have overviewed about...
Cyber Security is Not an Easy Game for CISO – It’s an Absolute End...
Let’s breakdown the little pieces and the critical dots to connect in the perspective of a CISO and a point-of-view from CyberSpace.
The threats...
Hackers Launching FlawedAmmyy Malware Via Undetected MS Excel Macros that Carried Powerful Backdoor
Threat actors from TA505 currently spreading powerful FlawedAmmyy RAT via weaponized MS Excel documents with malicious Excel 4.0 macro which is hard to detect...
Most Important Steps to Prevent Your Organization From Identity Theft – Detailed Explanation
Identity theft by Identity Thief is the ponder utilization of another person's character, it is a genuine wrongdoing(a serious crime). Identity Thief utilizes data about anybody without...
Proofpoint Q2 Threat Report – Ransomware Returns, Growth in Social Engineering and Email Fraud
According to Proofpoint Q2 Threat Report, the malicious message volume increased by 36% in the second quarter of 2018 and the ransomware returns back...
Hackers Distributing Malicious RTF Excel Sheets Document and Installing RAT using VBA Macro code
A recently discovered RTF documents that contain malicious VBA Macro code distributing to infect the windows users with dangerous Remote access Trojan ( RAT...
Hackers Increasing the use of “Command Line Evasion and Obfuscation” to Spread Advance...
Advance level threats are increasing day by day and attackers using more Sophisticated Techniques to bypass the Detection. Evasion and obfuscation technique give more...
A Malvertiser called “RoughTed” Bypass Ad-blocker and Get Half a Billion visits in 3...
A Malvertiser called "RoughTed" Successfully Bypass the Ad-Blockers and Delivery Malicious Payloads into the visitors Operating Systems and Browsers which is used to visit...
200 Unique Android Apps Discovered with Backdoor Called “MilkyDoor” Downloaded by Nearly 1...
An Android Backdoor called MilkyDoor Infected with More than 200 Apps in Play store which contains Nealy 1 million Downloads .
According to the Trend...
Ask.com Toolbar Compromised Twice in 2 Months , Second Attack Installed RAT
Ask Partner Network (APN) has been compromised twice within 2 month since 2016 November. Researcher's Discovered deliver malware to computers running the Ask.com Toolbar.
First...